cybersecurity

US Army cybersecurity personnel

WASHINGTON: Cybersecurity — it’s not just for networks anymore. The trend towards what’s called “the Internet of Things” means targets can be anywhere. “If there is a computer in something, it can be cyber-attacked, and we need to be able to harden it and defend it,” the Pentagon’s Deputy Chief Information Officer for Cybersecurity, Richard Hale,… Keep reading →

US Army photo

PENTAGON: As the US Army deploys more troops to the Pacific, it’s running into the limits of its long-range communications systems. The shortfall in comms capacity is not only becoming an issue as the service ramps up its “Pacific Pathways” exercises with Asian partners: It is also raisibng concerns about the network’s resiliency against a… Keep reading →

This picture taken December 26, 2011 sho

WASHINGTON: There’s no one thing that keeps the Pentagon’s chief of intelligence up at night. There’s half-a-dozen things — terrorism, cybersecurity, Iran, North Korea, Russia, and China — but Mike Vickers has a six-point plan to counter them. “The big challenge we face is really in the aggregation of challenges,” the under secretary for intelligence… Keep reading →

Sydney J. Freedberg Jr. photo

[Updated Friday with new DISA org chart] CRYSTAL CITY: The day before Islamic radicals hijacked Central Command’s Twitter account, the Defense Information Systems Agency officially launched a major overhaul intended, among other things, to increase cybersecurity. But it doesn’t mean the office is getting bigger or getting more money: DISA’s cybersecurity office will actually get smaller. “It’ll… Keep reading →

Brig. Gen. Robert Skinner

[UPDATED with Central Command statement on Twitter/YouTube hack] CRYSTAL CITY: There’s a new cyber sheriff in town — and none too soon. When the Pentagon’s social media accounts get hacked, as they did today, it’s acutely embarrassing. When the military’s internal networks get hacked, however, it’s potentially lethal. But the Defense Department doesn’t have a single organization… Keep reading →

cyber-field-ao-1312209633

Technology is moving too fast to keep track of everything, but there’s one overarching trend that policymakers must not miss in 2015. Call it “convergence.” Cybersecurity is no longer its own specialized function for tech geeks to take care of off to one side while the rest of the organization gets on with the real… Keep reading →

cyberao

WASHINGTON: In real-world warfare, troops and tanks maneuver to take advantage of the terrain. In the looking-glass world of cyberspace, however, “maneuver” may mean changing the terrain itself. If the enemy’s invading your country, you can dig a trench or blow a bridge, but otherwise you go to war with the landscape you have. If… Keep reading →

Phoenix Air isolation unit

WASHINGTON: The Pentagon’s Transportation Command — the folks who move most everything for the military from Point A to Point B — are testing a new isolation unit to fit in a C-17 or C-130 aircraft, just 60 days after issuing the requirement. The head of TransCom, Gen. Paul Selva, told reporters this morning at a… Keep reading →

nato-logo

WASHINGTON: NATO is now taking cyber threats as seriously as the Russian tanks and nuclear weapons it was created to deter. But the alliance has a long way to go just to shore up its own network defenses, and it explicitly eschews any role on the offense. NATO has not even written a formal policy… Keep reading →

cybera

The clouds, they are a-changin’. The Defense Information Systems Agency may have lost its status — always controversial and contested — as gatekeeper between the rest of the Defense Department and commercial providers of cloud computing. But Pentagon CIO Terry Halvorsen‘s decision to let other defense entities acquire cloud services on their own still leaves… Keep reading →

Page 1 of 1812345...18